共 43 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Ceballos I, 2020, Arxiv, DOI arXiv:2008.04137
[3]
Du J., 2022, arXiv
[4]
Nguyen TD, 2022, Arxiv, DOI arXiv:2101.02281
[5]
The Algorithmic Foundations of Differential Privacy
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2013, 9 (3-4)
:211-406
[6]
Erdogan E., 2023, arXiv
[7]
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning
[J].
PROCEEDINGS OF THE 21ST WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2022,
2022,
:115-124
[8]
Influence Function based Data Poisoning Attacks to Top-N Recommender Systems
[J].
WEB CONFERENCE 2020: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2020),
2020,
:3019-3025
[9]
Fu C, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P1397
[10]
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations
[J].
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18),
2018,
:619-633